5 Recommendations to Secure the Internet of Things

Step 2: Protect the Identity of Objects and Users

Firewalls, gates, doors, and fences no longer guard our security. The new perimeter is our identity. We need to secure this identity to prevent attackers from accessing our home security cameras and stealing our photo collections, bank statements, and medical records.

Identity protection must be embedded into the base platform on which our next-generation technology is being built, so that we can establish trust in day-to-day items and interact with our connected world confidently.

A reliance on passwords to prevent attackers from accessing systems, devices, and applications is outdated and ineffective. Attackers typically count on users implementing password-based security protocols, which opens the door to attacks — such as Trojan viruses, phishing, and man-in-the-middle — that take advantage of vulnerabilities. Attackers have evolved from simply wanting to achieve notoriety to becoming sophisticated thieves who steal personally identifiable information (PII) — such as financial and health care records and account numbers — to targeting the rapidly developing Internet of Things (IoT) market, where a hack becomes more personal and potentially life-threatening.

In this slideshow, Phil Montgomery, chief product officer at Identiv, will provide five recommendations to mitigate risk and maintain a strong security posture in this ever-growing connected world.

Cost reduction has been the main driver of IIoT adoption. Other contributors are the emergence of ancillary and complementary technologies, including low-power hardware devices, the cloud, Big Data analytics, robotics and automation and smart sensors. ... More >>